


default search action
International Journal of Information Security and Privacy, Volume 10
Volume 10, Number 1, 2016
- Amine Rahmani

, Abdelmalek Amine
, Reda Mohamed Hamou
:
Combination of Access Control and De-Identification for Privacy Preserving in Big Data. 1-27 - Colin Lai, Hung-Lian Tang, J. Michael Tarn, Sock H. Chung:

The Compliance of IT Control and Governance: A Case of Macao Gaming Industry. 28-44 - Pawan R. Bhaladhare, Devesh C. Jinwala

:
A Clustering Approach Using Fractional Calculus-Bacterial Foraging Optimization Algorithm for k-Anonymization in Privacy Preserving Data Mining. 45-65
Volume 10, Number 2, 2016
- Aftab Ahmad:

A Smart Grid Security Architecture for Wireless Advanced Metering Infrastructure (AMI). 1-10 - Rituparna Das

:
Are the Payments System and e-Banking in India Safer than in other SAARC Members? 11-25 - Kajal S. Patel

, Jagdish S. Shah:
Analysis of Existing Trust Based Routing Schemes Used in Wireless Network. 26-40 - Shaikha Alduaij, Zhiyuan Chen

, Aryya Gangopadhyay:
Using Crowd Sourcing to Analyze Consumers' Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level. 41-63
Volume 10, Number 3, 2016
- P. Mohamed Fathimal

, P. Arockia Jansi Rani
:
Threshold Secret Sharing Scheme for Compartmented Access Structures. 1-9 - Nilay R. Mistry

, Binoj Koshy, Mohindersinh Dahiya, Chirag Chaudhary, Harshal Patel, Dhaval Parekh, Jaidip Kotak, Komal Nayi, Priyanka Badva:
iPhone Forensics: Recovering Investigative Evidence using Chip-off Method. 10-24 - Amardeep Singh, Divya Bansal, Sanjeev Sofat:

Preventing Identity Disclosure in Social Networks Using Intersected Node. 25-41 - Erukala Suresh Babu

, C. Nagaraju
, Munaga H. M. Krishna Prasad:
IPHDBCM: Inspired Pseudo Hybrid DNA Based Cryptographic Mechanism to Prevent Against Collabrative Black Hole Attack in Wireless Ad hoc Networks. 42-66 - Mahmood Fazlali

, Peyman Khodamoradi, Farhad Mardukhi, Masoud Nosrati
, Mohammad Mahdi Dehshibi
:
Metamorphic malware detection using opcode frequency rate and decision tree. 67-86
Volume 10, Number 4, 2016
- Abdelaziz Amara Korba, Mehdi Nafaa, Salim Ghanemi:

Hybrid Intrusion Detection Framework for Ad hoc networks. 1-32 - Adesina S. Sodiya, Adegbuyi B.:

A Framework for Protecting Users' Privacy in Cloud. 33-43 - Azin Moradbeikie, Saeid Abrishami

, Hasan Abbasi:
Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing. 44-57 - Sumana M.

, K. S. Hareesha
:
Accurate Classification Models for Distributed Mining of Privately Preserved Data. 58-73

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














